Sciweavers

1623 search results - page 303 / 325
» Programming language concepts for software developers
Sort
View
120
Voted
AIL
2004
113views more  AIL 2004»
15 years 3 months ago
On the Ontological Status of Plans and Norms
This article describes an ontological model of norms. The basic assumption is that a substantial part of a legal system is grounded on the concept of agency. Since a legal system a...
Guido Boella, Leonardo Lesmo, Rossana Damiano
141
Voted
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 10 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
160
Voted
ACSE
2000
ACM
15 years 8 months ago
Are you interested in computers and electronics?
Secondary school students, when investigating tertiary study, have little opportunity to discover what a particular course has to offer and often have a poor understanding of empl...
David Abramson, Gordon S. Lowe, Peter Atkinson
127
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Mining exception-handling rules as sequence association rules
Programming languages such as Java and C++ provide exception-handling constructs to handle exception conditions. Applications are expected to handle these exception conditions and...
Suresh Thummalapenta, Tao Xie
135
Voted
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 5 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol